MedusaÀÕË÷Èí¼þ½«NASCARÁÐÈëÊܺ¦ÕßÃûµ¥
°ä²¼¹¦·ò 2025-04-091. MedusaÀÕË÷Èí¼þ½«NASCARÁÐÈëÊܺ¦ÕßÃûµ¥
4ÔÂ8ÈÕ£¬£¬MedusaÀÕË÷Èí¼þÍÅ»ï½üÈÕ½«NASCAR£¨È«ÃÀ»î¶¯Æû³µÈü³µÐ»á£©ÁÐÈëÊܺ¦ÕßÃûµ¥£¬£¬ÔÚÆä°µÍøÐ¹ÃÜÍøÕ¾ÉÏÒªÇóNASCARÖ§¸¶400ÍòÃÀÔªÊê½ð£¬£¬²»È»½«°ä²¼ÄÚ²¿Êý¾Ý¡£¡£¸Ã×éÖ¯»¹Ðû³ÆMcFarland Commercial Insurance Services¡¢Bridgebank LtdºÍPulse Urgent CareÒ²Ôâ¹¥»÷¡£¡£º£º£ºÚ¿ÍÒѰ䲼37ÕÅÓëNASCARÓйصÄÎĵµÍ¼Æ¬×÷Ϊ֤¾Ý£¬£¬ÆäÖÐÔ̺¬¹«Ë¾Æ·ÅÆ×ÊÁÏ¡¢ÉèÊ©µØÍ¼¡¢Ô±¹¤ÁªÏµ·½Ê½¼°ÄÚ²¿±Ê¼ÇºÍÕÕÆ¬¡£¡£¶Ôй¶ÎļþµÄ¼±¾ç·ÖÎöÏÔʾ£¬£¬ÆäÖÐÔ̺¬ÈüµÀ¾ßÌåµØÍ¼¡¢µç×ÓÓʼþµØÖ·¡¢Ô±¹¤ÐÕÃûºÍÖ°Îñ¼°Æ¾Ö¤ÓйØÐÅÏ¢£¬£¬Åú×¢NASCARµÄÔËÓªºÍºóÇÚÊý¾ÝÒÑÊÜË𡣡£NASCARÉÐδ»ØÓ¦¡¢ÈϿɻò·ñ¶¨ÕâЩָ¿Ø£¬£¬µ«Ë¼¿¼µ½ÆäÿÄêÊýÒÚÃÀÔªµÄÊÕÈ룬£¬³ÉÎªÍøÂç·¸×ï·Ö×ÓµÄÖ¸±ê²¢²»Ææ¹Ö¡£¡£2025Äê3ÔÂ13ÈÕ£¬£¬ÃÀ¹úÁª°îµ÷²é¾ÖºÍÍøÂ簲ȫÓë»ù´¡ÉèÊ©°²È«¾Ö°ä²¼½áºÏ²¼¸æ£¬£¬¶½´Ù¸÷×éÖ¯¼ÓÇ¿°²È«´ëÊ©£¬£¬³ö¸ñ½¨ÒéÆôÓÃË«³É·ÖÉí·ÝÑéÖ¤ºÍ¼à¿ØÏµÍ³ÒÔ²éÕÒδ¾ÊÚȨµÄÖ¤ÊéʹÓü£Ï󡣡£
https://hackread.com/medusa-ransomware-claims-nascar-breach-latest-attack/
2. ÍþвÐÐΪÕßÀÄÓÃSourceForge·Ö·¢Î±ÔìOffice²å¼þÇÔÈ¡¼ÓÃÜÇ®±Ò
4ÔÂ8ÈÕ£¬£¬ÍþвÐÐΪÕßÕýÀûÓúϷ¨Èí¼þÍÐ¹ÜÆ½Ì¨SourceForge·Ö·¢Î±ÔìµÄMicrosoft²å¼þ£¬£¬ÔÚÊܺ¦ÕßÍÆËã»úÉÏ×°ÖöñÒâÈí¼þÒÔÍÚ¾òºÍÇÔÈ¡¼ÓÃÜÇ®±Ò¡£¡£SourceForge.netÊÇÒ»¸öÊÜ»¶ÓµÄ¿ªÔ´ÏîÄ¿Íйܺͷַ¢Æ½Ì¨£¬£¬Ö»¹ÜÆäÊ¢¿ªµÄÏîÄ¿ÌύģÐÍΪÀÄÓÃÌṩÁ˿ռ䣬£¬µ«¶ñÒâÈí¼þ´«²¼Çé¿ö½ÏÉÙ¼û¡£¡£È»¶ø£¬£¬¿¨°Í˹»ù·¢ÏÖµÄлÒÑÓ°Ï쳬¹ý4,604¸öϵͳ£¬£¬ÖØÒªÎ»ÓÚ¶íÂÞ˹¡£¡£¶ñÒâÏîÄ¿¡°officepackage¡±¼ÙÒâOffice²å¼þ¿ª·¢¹¤¾ß¼¯ÖУ¬£¬ÆäÃèÊöºÍÎļþÊÇGitHubÉϺϷ¨MicrosoftÏîÖ÷ÕŸ±±¾¡£¡£µ±Óû§ËÑË÷°ì¹«²å¼þʱ£¬£¬»áµÃµ½Ö¸Ïò¡°officepackage.sourceforge.io¡±µÄÁ˾֡£¡£µã»÷ÏÂÔØ°´Å¥ºó£¬£¬Êܺ¦Õß»áÊÕµ½Ò»¸öZIPÎļþ£¬£¬ÆäÖÐÔ̺¬ÊÜÃÜÂë±£»£»£»¤µÄ´æµµºÍÒ»¸ö´øÓÐÃÜÂëµÄÎı¾Îļþ¡£¡£ÔËÐд浵ÖеÄMSIÎļþ»á¿ªÊͶà¸öÎļþ£¬£¬²¢Ö´ÐÐÒ»¸öVisual Basic¾ç±¾£¬£¬¸Ã¾ç±¾´ÓGitHub»ñÈ¡²¢Ö´ÐÐÅú´¦Öþ籾£¬£¬ÒÔ³ÉÁ¢ÓƾÃÐÔ²¢ÏÂÔØ¶îÍâÓÐÐ§ÔØºÉ¡£¡£ÕâЩÓÐÐ§ÔØºÉÔ̺¬¼ÓÃÜÇ®±ÒÍÚ¿ó·¨Ê½ºÍ¼ôÇз¨Ê½£¬£¬Ç°Õß½Ù³Ö»úеµÄÍÆËãÄÜÁ¦Îª¹¥»÷ÕßÍÚ¾ò¼ÓÃÜÇ®±Ò£¬£¬ºóÕ߼ල²¢´úÌæ¼ôÌù°åÖеļÓÃÜÇ®±ÒµØÖ·¡£¡£¹¥»÷Õß»¹Í¨¹ýTelegram API½Ó¹ÜÊÜϰȾϵͳµÄÐÅÏ¢£¬£¬²¢¿ÉÒýÈë¶îÍâÓÐÐ§ÔØºÉ¡£¡£
https://www.bleepingcomputer.com/news/security/fake-microsoft-office-add-in-tools-push-malware-via-sourceforge/
3. RansomEXXÀÕË÷Èí¼þÍÅ»ïÀûÓÃWindowsÁãÈÕ·ì϶½øÐй¥»÷
4ÔÂ8ÈÕ£¬£¬Î¢Èí½üÈÕÅû¶£¬£¬RansomEXXÀÕË÷Èí¼þÍÅ»ïÀûÓÃWindowsͨÓÃÈÕÖ¾ÎļþϵͳÖеĸßÑÏÖØÐÔÁãÈÕ·ì϶£¨CVE-2025-29824£©»ñÈ¡Êܺ¦ÕßϵͳȨÏÞ¡£¡£¸Ã·ì϶ÒòʹÓúó¿ªÊÍÎÊÌâµ¼Ö£¬£¬ÔÊÐíµÍȨÏÞ±¾µØ¹¥»÷Õßͨ¹ýµÍ¸´ÔӶȹ¥»÷»ñµÃϵͳȨÏÞ¡£¡£Ö»¹Ü΢ÈíÒѰ䲼ÊÜÓ°ÏìWindows°æ±¾µÄ°²È«¸üУ¬£¬µ«Õë¶ÔWindows 10 x64ºÍ32λϵͳµÄ²¹¶¡½«¾¡¿ì°ä²¼¡£¡£Î¢ÈíÖ¸³ö£¬£¬¹¥»÷Ö¸±êº¸ÇÃÀ¹úITºÍ·¿µØ²úÐÐÒµ¡¢Î¯ÄÚÈðÀ½ðÈÚÐÐÒµ¡¢Î÷°àÑÀÈí¼þ¹«Ë¾¼°É³Ìذ¢À²®ÁãÊÛÒµ¡£¡£Ö»¹ÜWindows 11°æ±¾24H2Óû§²»ÊÜÓ°Ï죬£¬Î¢ÈíÈÔ¶½´ÙÓû§¾¡¿ìÀûÓøüС£¡£¾ÝϤ£¬£¬RansomEXXÀÕË÷Èí¼þÍÅ»ïÔÚ¹¥»÷ÖÐÊ×ÏÈ×°ÖÃPipeMagicºóÃŶñÒâÈí¼þ£¬£¬ÓÃÓÚ²¿Êð·ì϶ÀûÓá¢ÀÕË÷Èí¼þ¸ºÔؼ°ÀÕË÷ÐÅ¡£¡£×Ô2023Äê3ÔÂÆð£¬£¬PipeMagic»¹±»ÓÃÓÚ²¿ÊðÕë¶ÔWindows Win32ÄÚºË×ÓϵͳµÄÁãÈÕ·ì϶£¨CVE-2025-24983£©µÄ·ì϶ÀûÓᣡ£¸Ã¶ñÒâÈí¼þÓÉ¿¨°Í˹»ùÓÚ2022Äê·¢ÏÖ£¬£¬¿ÉÍøÂçÃô¸ÐÊý¾Ý¡¢ÌṩԶ³Ì½Ó¼ûȨÏÞ£¬£¬²¢ÔÊÐí¹¥»÷Õß²¿Êð¶îÍâ¶ñÒâ¸ºÔØ½øÐкáÏòÒÆ¶¯¡£¡£
https://www.bleepingcomputer.com/news/security/microsoft-windows-clfs-zero-day-exploited-by-ransomware-gang/
4. CrushFTP·ì϶ÔâºÚ¿ÍÀûÓ㬣¬Ãô¸ÐÊý¾ÝÃæ¶ÔÀÕË÷Íþв
4ÔÂ9ÈÕ£¬£¬Áª°îÍøÂ簲ȫ¹ÙÔ±ºÍÍøÂ繫˾ÊÂÎñÏìÓ¦ÈËÔ±·¢³öÖҸ棬£¬ºÚ¿ÍÕýÔÚÀûÓÃÊ¢ÐÐÎļþ´«Ê乤¾ßCrushÖеķì϶½øÐй¥»÷¡£¡£CrushFTPÓÚ3ÔÂ21ÈÕ³õ´ÎÏò¿Í»§·¢³öÖҸ棬£¬¶½´Ù¸üÐÂϵͳÒÔÐÞ¸´CVE-2025-31161·ì϶£¬£¬¸Ã·ì϶ÓÉOutpost24×êÑÐÈËÔ±·¢ÏÖ¡£¡£Ö»¹ÜOutpost24´òËãÆÚ´ý90Ìì²Å¹«¿ªÅû¶£¬£¬µ«ÆäËû×êÑÐÈËÔ±Ò²·¢ÏÖÁ˸÷ì϶²¢Ìá½»ÁË×Ô¼ºµÄCVE±àºÅ£¬£¬µ¼Ö¹ؼüÐÅÏ¢±»¹«¿ª£¬£¬¹¥»÷Õ߳ûúÀûÓᣡ£´ÓǰÁ½ÖÜÄÚ£¬£¬·ÀÓùÕßÃdzÖÐøÖÒ¸æºÚ¿ÍÕýÔÚÀûÓø÷ì϶¡£¡£ÖÜÒ»£¬£¬KillÀÕË÷Èí¼þÍÅ»ïÐû³ÆÒÑͨ¹ý¸Ã·ì϶»ñÈ¡ÁË´óÁ¿Ãô¸ÐÊý¾Ý£¬£¬²¢Íþв½«Á¢¼´ÆðÍ·ÀÕË÷Êܺ¦Õß¡£¡£¶à¼ÒÊÂÎñÏìÓ¦¹«Ë¾Ö¤Êµ£¬£¬×éÖ¯Õýͨ¹ý¸Ã·ì϶Êܵ½¹¥»÷£¬£¬ShadowserverºÍCensys¾ù°µÊ¾»¥ÁªÍøÉϺ±¼û°Ù¸ö¶³öµÄCrushFTPʵÀý¡£¡£CrushFTP½²»°È˰µÊ¾£¬£¬¹«Ë¾ÒѶ½´Ù¿Í»§¾¡¿ì¸üÐÂϵͳ£¬£¬²¢Ö¸³ö¹ÌÈ»ÓÐһЩ±äͨ²½ÖèÄܹ»»º½â¸Ã·ì϶£¬£¬µ«²»»áÔÚ»¥ÁªÍøÉ¨ÃèÖÐÏÔʾ£¬£¬¿ÉÄÜ»áÓ°ÏìδÐÞ²¹·þÎñÆ÷ÊýÁ¿µÄͳ¼Æ¡£¡£HuntressµÄ±äÂÒÏìÓ¦ÈËÔ±°µÊ¾£¬£¬ËûÃÇÒѾ·¢ÏÖËÄ¼Ò·ÖÆç¹«Ë¾ÀûÓÃÁ˸÷ì϶£¬£¬Éæ¼°¶à¸öÐÐÒµ¡£¡£
https://therecord.media/crushftp-vulnerability-exploited
5. ÃÀ¹ú²ÆÕþ²¿Ç®±Ò¼àÀíÊðÔâºÚ¿ÍÈëÇÖ£¬£¬Ãô¸ÐÐÅÏ¢Ãæ¶Ô·çÏÕ
4ÔÂ8ÈÕ£¬£¬2023Äê6Ô£¬£¬Éí·Ý²»Ã÷µÄ¹¥»÷ÕßÈëÇÖÁËÃÀ¹ú²ÆÕþÊÖÏÂÊôµÄ¶ÀÁ¢»ú¹¹Ç®±Ò¼àÀíÊð£¨OCC£©£¬£¬»ñÈ¡Á˳¬¹ý150,000·âµç×ÓÓʼþ¡£¡£OCCÕÆ¹Ü¼à¹ÜÒøÐкÍÁª°î´¢Ðîлᣬ£¬È·±£ÆäºÏ¹æÔËÓª¡£¡£¾ÝÅí²©É籨µÀ£¬£¬ÍþвÐÐΪÕßÔÚÇÖÈëµç×ÓÓʼþϵͳÖÎÀíÔ±ÕË»§ºó£¬£¬»ñµÃÁË¼à¿ØÔ±¹¤µç×ÓÓʼþµÄÄÜÁ¦¡£¡£OCCÆäʱÏòÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö»ã±¨ÁËÕâ´Î¹¥»÷£¬£¬³ÆÆäÎªÉæ¼°Æäµç×ÓÓʼþϵͳºÍ¶à¸öµç×ÓÓʼþÕË»§µÄ¡°ÍøÂ簲ȫÊÂÎñ¡±£¬£¬²¢°µÊ¾¶Ô½ðÈÚ²¿ÃÅÎÞÓ°Ïì¡£¡£È»¶ø£¬£¬ºóÐøµ÷²éÏÔʾ£¬£¬¹¥»÷Õß½Ó¼ûµÄµç×ÓÓʼþÕË»§ÊýÁ¿Ô¶³¬´ËǰÈÏÖª£¬£¬Éæ¼°Ô¼100¸öÒøÐмà¹Ü»ú¹¹µÄµç×ÓÓʼþ¡£¡£2025Äê4ÔÂ8ÈÕ£¬£¬OCCÏòÃÀ¹ú¹ú»á´«µÝÁË2ÔÂ11ÈÕ·¢Ïֵġ°ÖØ´óÐÅÏ¢°²È«ÊÂÎñ¡±£¬£¬²¢°µÊ¾ÊÜËðµÄϵͳÖÎÀíÕË»§ÒÑÓÚ2ÔÂ12ÈÕ±»½ûÓᣡ£OCC²¹³ä³Æ£¬£¬¹¥»÷Õßδ¾ÊÚȨ½Ó¼ûÁËÆä¶àÃû¸ß¹ÜºÍÔ±¹¤µÄµç×ÓÓʼþ£¬£¬ÕâЩÓʼþÔ̺¬¸ß¶ÈÃô¸ÐµÄÁª°î¼à¹Ü½ðÈÚ»ú¹¹²ÆÕþÇé¿öÐÅÏ¢¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-lurked-in-treasury-occs-systems-since-june-2023-breach/
6. Hudson Rock½ÒHellCatй¥ÊÆ£º£º£ºJiraƾ֤³ÉÀÕË÷Í»ÆÆ¿Ú
4ÔÂ8ÈÕ£¬£¬Hudson RockµÄÍøÂ簲ȫ×êÑÐÈËÔ±·¢ÏÖ£¬£¬HellCatÀÕË÷Èí¼þ×éÖ¯¶ÔÃÀ¹úºÍÅ·ÖÞµÄËļҹ«Ë¾ÌáÒéÐÂÒ»ÂÖÍøÂç¹¥»÷£¬£¬Ö¸±êÔ̺¬Asseco Poland¡¢HighWire Press¡¢RacamiºÍLeoVegas¼¯ÍÅ¡£¡£¹¥»÷µÄ¹²Í¬ÌصãÊÇ£¬£¬ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þÔÚÏÖʵ¹¥»÷²úÉúǰÇÔÈ¡ÁËJiraƾ֤¡£¡£ÕâЩ¶ñÒâÈí¼þ±äÖÖÈçStealC¡¢Raccoon¡¢RedlineºÍLumma Stealer£¬£¬ÔçÔÚ¼¸¸öÔÂÉõÖÁ¼¸Äêǰ¾ÍÍøÂçÁËÊÜϰȾԱ¹¤»úеÉϵĵǼÐÅÏ¢¡£¡£Ò»µ©»ñµÃƾ֤£¬£¬HellCat±ãµÇ¼Atlassian Jira»·¾³£¬£¬½ø¶ø½øÈëÄÚ²¿ÏµÍ³£¬£¬ÇÔÈ¡Ãô¸ÐÊý¾Ý²¢Æô¶¯ÀÕË÷Èí¼þÁ÷³Ì¡£¡£HellCat´ËÇ°ÔøÊ¹ÓÃÒ»Ñù²½ÖèÈëÇÖ¶à¼Ò³ÛÃû¹«Ë¾£¬£¬ÆäÕ½ÊõÔ̺¬ÔÚÐÅÏ¢ÇÔÈ¡ÕßÈÕÖ¾ÖвéÕÒÆ¾Ö¤£¬£¬½Ó¼ûJira£¬£¬ÇÔÈ¡Êý¾Ý£¬£¬¶øºóË÷ÒªÊê½ð¡£¡£Jira×÷ΪºÜ¶à¹«Ë¾µÄÖØÒªÏµÍ³£¬£¬Ó뿪·¢¹¤×÷Á÷¡¢¿Í»§Êý¾Ý¡¢ÄÚ²¿ÎĵµºÍϵͳ½Ó¼û½ÚÖÆçÇÃÜÓйأ¬£¬Òò¶ø³ÉΪ¸ß¼ÛÖµÖ¸±ê¡£¡£×êÑÐÈËÔ±Ö¸³ö£¬£¬ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þϰȾÓû§É豸²¢ÇÔÈ¡Òѱ£ÁôµÄµÇ¼ÐÅÏ¢¡¢cookie¡¢»á»°ÁîÅÆµÈ£¬£¬ÕâЩÊý¾ÝҪôÔÚ°µÍøÊг¡ÉÏÏúÊÛ£¬£¬ÒªÃ´±»HellCatµÈ×éÖ¯Ö±½ÓʹÓᣡ£
https://hackread.com/hellcat-ransomware-firms-infostealer-stolen-jira-credentials/


¾©¹«Íø°²±¸11010802024551ºÅ